Font Size: a A A

Design And Implementation Of Software System In Line With Multi-protocol UHF RFID Reader

Posted on:2017-09-04Degree:MasterType:Thesis
Country:ChinaCandidate:W H MaFull Text:PDF
GTID:2348330485985015Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In recent years, the internet of things, benefiting from the characteristics of the automatic identification, has been widely applied to modern service, which made people's daily life more convenient and efficient. As one of the key technologies of internet of things, the UHF RFID technologies, benefiting from long-distance identification, high speed of data transmission, high safely and reliability, is given great attention to by people from all walks of life both at home and abroad. The technology has been widely applied in a large variety of fields, such as intelligent management of the library and Electronic Toll Collection. Because of lack of research on this field in our country, the ISO/IEC 18000-6C protocol has been widely applied in our country. Though GB/T 29768-2013 protocol was proposed in 2014, the research about the protocol was still limited and devoid. As a result, the design of the reader, which met the requirements of both ISO/IEC 18000-6C protocol and GB/T 29768-2013 protocol, is of great significance.First of all, a great deal of research, focused on the present development of RFID, has been done in this thesis. And then, it is found that there is a lot of demand to design a new reader to meet the ISO/IEC 18000-6C protocol and GB/T 29768-2013 protocol at the same time. After that, a viable solution is confirmed based on the comparison and analysis of parameters of both physical layer and protocol layer. Because of the different anti-collision mechanism, it takes lots of time to study and analyze the anti-collision arithmetic. Then a new arithmetic is proposed by means of a great deal of calculations and derivation. Finally, a general scheme was established. In order to realize the design more smoothly, we utilize the thoughts of module. Therefore the total scheme could be easily divided into two major parts, such as the host computer procedure and control program of the reader. The host computer procedure is used to capture the operation of the user and send the command to the reader. By contrary, the reader accepts the command and returns the status of the operations. Also, the software system of the reader could be separated into tree modules, namely, the control program of the reader module, hardware configuration module and protocol implementation module. In the protocol module, the various operations, such as inventory, reading, writing, etc, is analyzed in detail. At last, verification and analysis of the physical properties of the entire reader has been tested carefully, according to the regulation of the two different protocols.Currently, the states attach great importance to the development of the internet of things. And there are many products based on ISO/IEC 18000-6C protocol. Therefore, it is important to develop a stable and efficient reader in line with ISO/IEC 18000-6C and GB / T 29768-2013 protocol.
Keywords/Search Tags:UHF, RFID, reader, ISO/IEC 18000-6C protocol, GB/T 29768-2013 protocol
PDF Full Text Request
Related items